The existing network security assessment models have the problems of inadequate capacity of quantitative analysis and lacking for vulnerabilities correlation. To address these problems, a hierarchical network security evaluation model is proposed. The network is divided into vulnerability level, service level, equipment level and network level. The model uses attack graph to correlate the network vulnerabilities, and then calculates the probabilities of successfully exploiting the vulnerabilities. On this basis, the quantitative risks of each level are calculated. Since this model much more accords with the features of network structure, it is an effectively guidance for the network administrators to develop and improve the network security policies.
A rectangular planar spiral antenna sensor was designed for detecting the partial discharge in gas insulation substations (GIS). It can expediently receive electromagnetic waves leaked from basin-type insulators and can effectively suppress low frequency electromagnetic interference from the surrounding environment. Certain effective techniques such as rectangular spiral structure, bow-tie loading, and back cavity structure optimization during the antenna design process can miniaturize antenna size and optimize voltage standing wave ratio (VSWR) characteristics. Model calculation and experimental data measured in the laboratory show that the antenna possesses a good radiating performance and a multiband property when working in the ultrahigh frequency (UHF) band. A comparative study between characteristics of the designed antenna and the existing quasi-TEM horn antenna was made. Based on the GIS defect simulation equipment in the laboratory, partial discharge signals were detected by the designed antenna, the available quasi-TEM horn antenna, and the microstrip patch antenna, and the measurement results were compared.
Library function call sequence is the direct reflection of a program's behavior. The relationship between program vulnerability and library calls is analyzed, and an intrusion detection method via library calls is proposed, in which the short sequences of library call are used as signature profile. In this intrusion detection method, library interposition is used to hook library calls, and with the discussion of the features of the library call sequence in detail, an algorithm based on information-theory is applied to determine the appropriate length of the library call sequence. Experiments show good performance of our method against intrusions caused by the popular program vulnerabilities.
Tunnel magnetoresistance (TMR) can measure weak magnetic fields and has significant advantages for use in alternating current/direct current (AC/DC ) leakage current sensors for power equipment; however, TMR current sensors are easily perturbed by external magnetic fields, and their measurement accuracy and measurement stability are limited in complex engineering application environments. To enhance the TMR sensor measurement performance, this paper proposes a new multi-stage TMR weak AC/DC sensor structure with high measurement sensitivity and anti-magnetic interference capability. The front-end magnetic measurement characteristics and interference immunity of the multi-stage TMR sensor are found to be closely related to the multi-stage ring size design via finite element simulation. The optimal size of the multipole magnetic ring is determined using an improved non-dominated ranking genetic algorithm (ACGWO-BP-NSGA-II) to derive the optimal sensor structure. Experimental results demonstrate that the newly designed multi-stage TMR current sensor has a measurement range of 60 mA, a fitting nonlinearity error of less than 1%, a measurement bandwidth of 0–80 kHz, a minimum AC measurement value of 85 μA and a minimum DC measurement value of 50 μA, as well as a strong external electromagnetic interference. The TMR sensor can effectively enhance measurement precision and stability in the presence of intense external electromagnetic interference.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.